Knowledge Articles

"This message contains information according to the
preferences you set in My Oracle Support. To modify your settings or to turn
off this automated message, login to My Oracle Support (http://support.oracle.com) and click on
'More' -> 'Settings' -> 'Hot Topics E-mail'" My Oracle Support

viernes, 29 de abril de 2016

12 Months of Database 12c: Database In-Memory

Join Oracle and community experts as they provide insight into what in-memory means in Database 12c, discuss common misconceptions, and answer your questions so that you can take full advantage of your database.

jueves, 28 de abril de 2016

Ransomware: Latest Cyber Extortion Tool

FBI ClevelandApril 26, 2016

Special Agent Vicki D. Anderson(216) 522-1400

Ransomware has become a significant threat to U.S. businesses and individuals. In 2014, over 1,800 complaints were filed regarding ransomware, resulting in a loss of more than $23 million. In 2015, that number grew to more than 2,400 complaints with a reported loss of more than $24 million.

Perpetrators use ransomware to encrypt a user’s important files and documents, making them unreadable, until a ransom is paid. Ransomware victims are not only at risk of losing their files but may also experience financial loss due to paying the ransom, loss of productivity, IT services, legal fees, network countermeasures, and/or the purchase of credit monitoring services for employees or customers if their information was referenced in the encrypted files. Everyone is at risk from this threat; there is no indication at this time that any particular sector or type of business or individual is specifically targeted.

Prevention is the most effective defense against ransomware, and it is critical to take precautionary measures for protection. These measures include, but are not limited to, the following:

Implement a robust data back-up and recovery plan. Maintain copies of your files, particularly sensitive or proprietary data, in a separate secure location. Back-up copies of sensitive data should not be readily accessible from local networks.

Never open attachments included in unsolicited e-mails. Be very vigilant about links contained in e-mails, even if the link appears to be from someone you know.

Keep your anti-virus software up to date.

Enable automated patches for your operating system and web browser.

Only download software, especially free software, from sites you know and trust.

If you believe you are a victim of an extortion attempt, we strongly encourage you to contact your local FBI field office, which may be able to provide guidance or assistance. Contacting your local FBI field office may also assist in identifying the perpetrator and the malware used, which could help prevent future victimizations. In addition, file a complaint with the Internet Crime Complaint Center (IC3), including as much information as possible in your complaint.

While the FBI recognizes that ransomware victims may feel they have few viable options if they do not have a data backup or if they cannot sustain a release of confidential or proprietary information, the FBI does not condone payment of ransoms. Payment of extortion monies may encourage continued criminal activity and lead to other victimizations, and the funds may be used by criminals to facilitate other serious crimes. In addition, in some cases, even if payment is made, the decryption key provided by the perpetrator to unlock files may not work due to the system configuration issues.

Oracle (NYSE: ORCL) today announced that it has entered into a definitive agreement to acquire Textura (NYSE: TXTR), a leading provider of construction contracts and payment management cloud services for $26.00 per share in cash. The transaction is valued at approximately $663 million, net of Textura’s cash.

Textura’s cloud services process $3.4 billion in payments for over 6,000 projects each month, helping keep projects on time and under budget while reducing risk for developers, contractors and subcontractors. Textura offers its cloud services in a consumption model preferred by the engineering and construction industry whereby the companies involved pay based on project activity. Further, usage of Textura’s cloud services creates a network effect that benefits all participants as more than 85,000 general and subcontractors are connected to the platform.

Oracle Primavera offers a complete suite of cloud solutions for project, cost, time and risk management. The Oracle Primavera flagship products have been completely re-architected for the Cloud, and the result is a set of cloud services that are growing rapidly as construction and engineering companies embrace digital transformation. Together, Oracle Primavera and Textura will form the Oracle Engineering and Construction Global Business Unit offering a comprehensive cloud-based project control and execution platform that manages all phases of engineering and construction projects.

“The increasingly global engineering and construction industry requires digital modernization in a way that automates manual processes and embraces the power of cloud computing to easily connect the construction job site, reduce cost overruns, and improve productivity,” said Mike Sicilia, SVP and GM, Engineering and Construction Global Business Unit, Oracle. “Together, Textura and Oracle Engineering and Construction will have the most comprehensive set of cloud services in the industry.”

“Textura’s mission is to bring workflow automation and transparency to complex construction projects while improving their financial performance and minimizing risks,” said David Habiger, Chief Executive Officer, Textura. “We are excited to join Oracle and bring our cloud-based capabilities to help extend the Oracle Engineering and Construction Industry Cloud Platform.”

The Board of Directors of Oracle has unanimously approved the transaction. The transaction is expected to close in 2016, subject to Textura stockholders tendering 66 2/3% of Textura’s outstanding shares and derivative securities exercised prior to the closing (as required by Textura’s certificate of incorporation) in the tender offer, certain regulatory approvals and other customary closing conditions.

miércoles, 27 de abril de 2016

David Johnson Named Associate Executive Assistant Director for the Criminal, Cyber, Response, and Services Branch

Washington, D.C.April 27, 2016

FBI National Press Office(202) 324-3691

FBI Director James B. Comey has named David Johnson as the associate executive assistant director of the Criminal, Cyber, Response, and Services Branch. In this role, he will support the FBI’s cyber and criminal investigations, international operations, critical incident response, and victim assistance. He will oversee the FBI’s development of cyber policy and strategy and serve as the Bureau’s operational lead of the Five Eyes Law Enforcement Group (FELEG), an international coalition of law enforcement agencies from the United States, the United Kingdom, Canada, Australia, and New Zealand. Mr. Johnson most recently served as the special agent in charge of the San Francisco Division.

Mr. Johnson began his FBI career in 1991 in the San Jose Resident Agency, San Francisco Division, where he worked violent crime, drug trafficking, and matters impacting high-technology companies. During his tenure there, he served as the case agent of the first economic espionage case ever to be prosecuted.

Throughout his 25-year career in the FBI, Mr. Johnson has held leadership positions in the San Francisco Division, the Criminal Investigative Division (CID), and the Salt Lake City Division, where he was the special agent in charge. As unit chief of CID’s Crimes Against Children Unit, he established Child Abduction Rapid Deployment teams, which deploy experienced investigators to provide assistance to FBI field offices and state and local law enforcement during the most critical time period following a child abduction.

Mr. Johnson holds bachelor’s and law degrees from the University of Pittsburgh.

Download Security Guides!

Video Training Course at $199, now FREE! Take a deep dive into hacking web sites and web applications using the latest techniques. In this course, we will teach you the top exploits including Cross-site Scripting, Cross-site Request Forgery, and more! You'll get real world examples including a Netflix case study along with the mitigation techniques to prevent these attacks.

Being in IT I'm sure you know someone who's been hit with ransomware or you have been though it yourself. Wouldn't it be great to have a manual of what to do when you get hit and how to prevent it in the future? Now you do! This manual is packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware.

This is third-party material. If you're downloading a whitepaper or ebook for the first time, our distribution service, TradePub, will ask for some personal information in order to help us understand our audience. You will only have to do this once. After that, the system will recognise you. Note: We promise to respect your privacy and keep all information we collect safe. We will never share or sell your information with third parties.